We present a new type of authentication scheme for quantum message based on algebraic coding theory and quantum computation operations between different quantum registers. The results are that if the pre-coding genera...
详细信息
ISBN:
(纸本)0819455865
We present a new type of authentication scheme for quantum message based on algebraic coding theory and quantum computation operations between different quantum registers. The results are that if the pre-coding generator matrix in SN-S code is public, the quantum scheme is a public-key data integrity scheme;if it is secret, the quantum scheme is a hybrid data origin authentication scheme. The advantage of this scheme is that the public and secret keys are merely some classical data.
Orbit codes, as special constant dimension subspace codes, have attracted much attention due to their applications for error correction in random network coding. They arise as orbits of a subspace of Fqn under the act...
详细信息
Orbit codes, as special constant dimension subspace codes, have attracted much attention due to their applications for error correction in random network coding. They arise as orbits of a subspace of Fqn under the action of some subgroup of the finite general linear group GLn(q). The main contribution of this paper is to propose new methods for constructing large non-cyclic orbit codes. First, using the subgroup structure of maximal subgroups of GLn(q), we propose a new construction of an abelian non-cyclic orbit codes of size qk with k <= n/2. The proposed code is shown to be a partial spread which in many cases is close to the known maximum-size codes. Next, considering a larger framework, we introduce the notion of tensor product operation for subspace codes and explicitly determine the parameters of such product codes. The parameters of the constructions presented in this paper improve the constructions already obtained in [6] and [7]. (c) 2025 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.
Abstract: The role of the finite Fourier transform in the theory of error correcting codes has been explored in a recent text by Richard Blahut. In this work we study how the finite Fourier transform relates t...
详细信息
Abstract: The role of the finite Fourier transform in the theory of error correcting codes has been explored in a recent text by Richard Blahut. In this work we study how the finite Fourier transform relates to certain polynomial identities involving weight enumerator polynomials of linear codes. These include the generalized MacWilliams identities and theorems originally due to ${\text {R}}$. Gleason concerning polynomial algebras containing weight enumerator polynomials. The Heisenberg group model of the finite Fourier transform provides certain algebras of classical theta functions which will be applied to reprove Gleason’s results.
The article presents an overview on the modern research of fuzzy logics and fuzzy model theory in the algebraic systems. It examines the concept of fuzzy in the proposed approximate reasoning of the valued logics in t...
详细信息
The article presents an overview on the modern research of fuzzy logics and fuzzy model theory in the algebraic systems. It examines the concept of fuzzy in the proposed approximate reasoning of the valued logics in the algebraic structure. It cites the calculation of fuzzy logic with interval of generated fuzzy model.
Some mathematical theories in physics justify their explanatory superiority over earlier formalisms by the clarity of their postulates. In particular, axiomatic reconstructions drive home the importance of the composi...
详细信息
Some mathematical theories in physics justify their explanatory superiority over earlier formalisms by the clarity of their postulates. In particular, axiomatic reconstructions drive home the importance of the composition rule and the continuity assumption as two pillars of quantum theory. Our approach sits on these pillars and combines new mathematics with a testable prediction. If the observer is defined by a limit on string complexity, information dynamics leads to an emergent continuous model in the critical regime. Restricting it to a family of binary codes describing 'bipartite systems,' we find strong evidence of an upper bound on bipartite correlations equal to 2.82537. This is measurably different from the Tsirelson bound. The Hilbert space formalism emerges from this mathematical investigation as an effective description of a fundamental discrete theory in the critical regime.
An unfashionable nineteenth century technique, invariant theory, has recently been used to study error-correcting codes. This technique is potentially of much wider application, is very powerful, often produces startl...
详细信息
An unfashionable nineteenth century technique, invariant theory, has recently been used to study error-correcting codes. This technique is potentially of much wider application, is very powerful, often produces startling results, and (not least) is fun to use.
Low-rank parity-check (LRPC) codes are rank-metric codes over finite fields, which have been proposed by Gaborit et al. (Proceedings of the workshop on coding and cryptography WCC, vol 2013, 2013) for cryptographic ap...
详细信息
Low-rank parity-check (LRPC) codes are rank-metric codes over finite fields, which have been proposed by Gaborit et al. (Proceedings of the workshop on coding and cryptography WCC, vol 2013, 2013) for cryptographic applications. Inspired by a recent adaption of Gabidulin codes to certain finite rings by Kamche et al. (IEEE Trans Inf theory 65(12):7718-7735, 2019), we define and study LRPC codes over Galois rings-a wide class of finite commutative rings. We give a decoding algorithm similar to Gaborit et al.'s decoder, based on simple linear-algebraic operations. We derive an upper bound on the failure probability of the decoder, which is significantly more involved than in the case of finite fields. The bound depends only on the rank of an error, i.e., is independent of its free rank. Further, we analyze the complexity of the decoder. We obtain that there is a class of LRPC codes over a Galois ring that can decode roughly the same number of errors as a Gabidulin code with the same code parameters, but faster than the currently best decoder for Gabidulin codes. However, the price that one needs to pay is a small failure probability, which we can bound from above.
Mobile communication through 3G network has grown rapidly in recent years. It might be of interest to transmit secret messages over 3G voice channels. In this paper, we introduce a new covert communication scheme via ...
详细信息
Mobile communication through 3G network has grown rapidly in recent years. It might be of interest to transmit secret messages over 3G voice channels. In this paper, we introduce a new covert communication scheme via Adaptive Multi-Rate Wideband (AMR-WB) encoded speech. An adaptive suboptimal pulse combination constrained (ASOPCC) method is presented to embed data on compressed speech signal of AMR-WB codec. The method takes advantage of the "redundancy", created by non-exhaustive search of algebraic code-book, to encode secret information. An embedding factor eta is used to control embedding bits. By properly setting eta, ASOPCC can offer a better trade-off between speech quality and embedding capacity in the process of coding mode switching. Experimental results show that the proposed method is quite promising for both high capacity and good imperceptivity. Although ASOPCC is only applied to AMR-WB codec in this article, it can be further used by any other speech coding based on algebraic Coded Exited Linear Prediction (ACELP). (C) 2012 Elsevier Ltd. All rights reserved.
We consider the proximity testing problem for error-correcting codes which consist in evaluations of multivariate polynomials either of bounded individual degree or bounded total degree. Namely, given an oracle functi...
详细信息
We consider the proximity testing problem for error-correcting codes which consist in evaluations of multivariate polynomials either of bounded individual degree or bounded total degree. Namely, given an oracle function f : L-m -> F-q, where L subset of F-q, a verifier distinguishes whether f is the evaluation of a low-degree polynomial or is far (in relative Hamming distance) from being one, by making only a few queries to f. This topic has been studied in the context of locally testable codes, interactive proofs, probalistically checkable proofs, and interactive oracle proofs. We present the first interactive oracle proofs of proximity (IOPP) for tensor products of Reed-Solomon codes (evaluation of polynomials with bounds on individual degrees) and for Reed-Muller codes (evaluation of polynomials with a bound on the total degree) that simultaneously achieve logarithmic query complexity, logarithmic verification time, linear oracle proof length and linear prover running time. Such low-degree polynomials play a central role in constructions of probabilistic proof systems and succinct non-interactive arguments of knowledge with zero-knowledge. For these applications, highly-efficient multivariate low-degree tests are desired, but prior probabilistic proofs of proximity required super-linear proving time. In contrast, for multivariate codes of length N, our constructions admit a prover running in time linear in N and a verifier which is logarithmic in N. Our constructions are directly inspired by the IOPP for Reed-Solomon codes of [Ben-Sasson et al., ICALP 2018] named "FRI protocol". Compared to the FRI protocol, our IOPP for tensor products of Reed-Solomon codes achieves the same efficiency parameters. As for Reed-Muller codes, for fixed constant number of variables m, the concrete efficiency of our IOPP for Reed-Muller codes compares well, all things equal.
暂无评论